Lee and Gaensslen's Advances in Fingerprint Technology, Third Edition
Reflecting new discoveries in fingerprint science, Lee and Gaensslen’s Advances in Fingerprint Technology, Third Edition has been completely updated with new material and nearly double the references contained in the previous edition. The book begins with a detailed review of current, widely used development techniques,...
MySQL and Java Developer's Guide The first comprehensive guide to MySQL for Java developers
With more than three million users, MySQL is the most popular open source database server in the world. It is the most popular database server for Linux and also runs on Windows, Macintosh, FreeBSD, and many flavors of UNIX. Most developers have built MySQL applications using...
The Essential Guide to Image Processing THE Must-have introduction to image processing for both students and practitioners.
This comprehensive and state-of-the art approach to image processing gives engineers and students a comprehensive introduction, and includes full coverage of key applications: image watermarking, fingerprint recognition, face recognition and...
BeagleBone for Secret Agents
Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware
About This Book
Interface with cryptographic hardware to add security to your embedded project, securing you from external threats.
Galaxy S5: The Missing Manual (Missing Manuals)
Get the most out of Samsung’s Galaxy S5 smartphone right from the start. With clear instructions from technology expert Preston Gralla, this Missing Manual gives you a guided tour of Samsung's new flagship phone, including great new features such as the fingerprint scanner, heart rate sensor, and Download Booster....
Human Ear Recognition by Computer (Advances in Pattern Recognition)
Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative...
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic
commerce, and welfare disbursement require reliable person recognition systems.
Traditional person authentication methods based on passwords and identity
documents often fail to meet the stringent security and performance demands of
these... My Motorola Atrix 4G
Step-by-step instructions with callouts to Motorola Atrix 4G photos so that you can see exactly what to do
Help when you run into Motorola Atrix 4G problems or limitations
|Result Page: 4 3 2 1 |